News

2015-08-24

How Uber Could Help Change Spycraft

Social media is an indicator of developments that the intelligence apparatus would never previously have had access to.

2015-08-24

Investors Pour $Billions in to Cybersecurity

Venture capital firms & corporate investors have put a record amount of money in to cybersecurity companies over the past year.

2015-08-24

Defusing The Internet Of Things Time Bomb

The IoT offerings present a unique challenge because of the balance between functionality and connectivity.

2015-08-24

Ad Block Software 'Costs Firms £14bn A Year'

The economic impact of ad blocking is real and measurable

2015-08-21

Fraudsters Steal $46.7m From Ubiquiti Networks

Business E-mail Compromise (BEC) scam: The incident involved employee impersonation and fraudulent requests from an outside entity.

2015-08-21

When Your White Hat Is Really a Black Hat

Can you really trust all the people working for your company (or hired contractors) to protect sensitive data?

2015-08-14

Sun Tzu 2.0: Is CyberWar the new Warfare?

The dynamics of warfare are changing along with the threat landscape. How do nations fight a cyber-battle?

2015-08-14

Hacking Critical Infrastructure: How-To Guide

Cyber-aided physical attacks on critical infrastructure is a growing concern. How to pull them off and how to defend against them.

2015-08-14

Artificial Intelligence: Myths, Facts and Future

Should artificial intelligence be as smart as an average human?

2015-08-14

The Robots Taking Your Job Could Get You Killed

Poorly implemented automation in chemical & pharmaceutical plants is highly vulnerable to a catastrophic cyber attack.

2015-08-14

Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

A computer virus was used to spy on the recent high-level Iran nuclear talks. Who would do that?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.